Abstract
Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of attacks and exploitations like the Web. Among the attacks, those that target SQL injection vulnerabilities have consistently been top-ranked for the last years. Testing to detect such vulnerabilities before making web services public is crucial. We present in this paper an automated testing approach, namely μ4SQLi, and its underpinning set of mutation operators. μ4SQLi can produce effective inputs that lead to executable and harmful SQL statements. Executability is key as otherwise no injection vulnerability can be exploited. Our evaluation demonstrated that the approach is effective to detect SQL injection vulnerabilities and to produce inputs that bypass application firewalls, which is a common configuration in real world.
| Original language | English |
|---|---|
| Title of host publication | 2014 International Symposium on Software Testing and Analysis, ISSTA 2014 - Proceedings |
| Publisher | Association for Computing Machinery, Inc |
| Pages | 259-269 |
| Number of pages | 11 |
| ISBN (Electronic) | 9781450326452 |
| DOIs | |
| Publication status | Published - 21 Jul 2014 |
| Externally published | Yes |
| Event | 23rd International Symposium on Software Testing and Analysis, ISSTA 2014 - San Jose, United States Duration: 21 Jul 2014 → 25 Jul 2014 |
Publication series
| Name | 2014 International Symposium on Software Testing and Analysis, ISSTA 2014 - Proceedings |
|---|
Conference
| Conference | 23rd International Symposium on Software Testing and Analysis, ISSTA 2014 |
|---|---|
| Country/Territory | United States |
| City | San Jose |
| Period | 21/07/14 → 25/07/14 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Keywords
- Mutation testing
- SQL injection
- Test generation
Fingerprint
Dive into the research topics of 'Automated testing for SQL injection vulnerabilities: An input mutation approach'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver